Network+ Chapter 7: Virtualization and Cloud Computing

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which remote access protocol is used over an Ethernet network? A. PPPoE B. RAS C. PPP D. SLIP

- A. PPPoE - When PPP Is used over an Ethernet network (no matter that connection type), is known as PPPoE (PPP over Ethernet).

Which encryption benchmark ensures data is not modified after its transmitted and before its received? A. Confidentially B. Integrity C. Availability D. Symmetric

- B. Integrity - Integrity, Data is not modified in the time after the sender transmits it and before the receiver picks it up.

Which cloud computing services model gives software developers access to multiple operating systems for testing? A. IaaS B. PaaS C. SaaS D. XaaS

- B. PaaS - PaaS (Platform as a Service), developers often require access to multiple platforms during the development process. A platform in this context includes the operating system, the runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs.

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes? A. Virtual Firewall B. Virtual Switch C. Virtual Router D. Virtual Load Balancer

- B. Virtual Switch - As soon as the virtual machine's vNIC is selected, the hypervisor creates a connection between that VM and the host. Depending on the hypervisor, this connection might be called a bridge or a switch. This vSwitch (virtual switch) or bridge is a logically defined device that operates at the Data Link layer to pass frames between nodes.

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources? A. Active Directory B. Group Policy C. Direct Access D. RAS (Remote Access Service)

- C. DirectAccess - DirectAccess authenticates users to the Windows domain.

Which encryption protocol does GRE use to increase the security of its transmissions? A. SSL B. SFTP C. IPsec D. SSH

- C. IPsec - GRE (Generic Routing Encapsulation), developed by Cisco, is a Layer 3 protocol used to transmit PPP, IP, and other kinds of messages through a tunnel. Like L2TP, GRE is used in conjunction with IPsec to increase the security of the transmission.

With which network connection type does the VM obtain IP addressing information from its host? A. Bridged Mode B. Managed Mode C. NAT Mode D. Host-Only Mode

- C. NAT mode - NAT MODE, a vNIC relies on the host machine to act as a NAT device. The VM obtains IP addressing information form its host, rather than a server or router on the physical network.

Which tunneling protocol is a component of the IPsec protocol suite? A. L2TP B. OpenVPN C. PPTP D. IKEv2

- D. IKEv2 - IKE (internet exchange key), negotiates the exchange of keys, including authentication of the keys; the current version is IKEv2.

List two advantages to using virtualization on a network.

- Efficient use of resources, physical clients or servers devoted to one function typically use only a fraction of their capacity. - Cost and energy savings, organizations save money by purchasing fewer and less expensive physical machines. - Fault and threat isolation, in a virtual environment, the isolation of each guest system means that a problem with one guest does not affect the others. - Simple backups, recovery, and replication, virtualization software enables network administrators to save backup images of a guest machine.

What kind of device can be used to configure and manage physical and virtual networking devices across the network?

- Every VM has its own virtual network adapter, or vNIC (virtual NIC), that can connect the VM to other machines, both virtual and physical

How does a vNIC get a MAC address?

- Every VM has its own virtual network adapter, or vNIC (virtual NIC), that can connect the VM to other machines, both virtual and physical. Upon creation, each vNIC is automatically assigned a MAC address.

Which Transport layer protocol does PPTP use?

- PPTP (point-to-point tunneling protocol), is an older, Layer 2 protocol developed by Microsoft that encapsulates VPN data frames. It uses TCP segments at the Transport layer.

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

- The digital certificate is issued, maintained, and validated by an organization called a CA (certificate authority).

Which port must be open for RDP traffic to cross a firewall?

- To allow a Remote Desktop Connection over the internet, the router must be configured to forward RDP traffic (port 3389) to the correct computer.

Which type of hypervisor is installed on bare metal?

- Type 1 hypervisor, installs on a computer before any OS and is therefore called a bare-metal hypervisor

Which terminal emulation protocol is similar to RDP but is open source?

- VNC (Virtual Network Computing or Virtual Network Connection) uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation or server. Because VNC is open source, many companies have developed their own software.

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer? A. Hypervisor B. NVF (Network Functions Virtualizations) C. SDN (software-defined technology) D. Terminal Emulation

- A. Hypervisor - A Hypervisor, creates and manages a VM, and manages resource allocation and sharing between a host and any of its guest VMs.

Which remote file access protocol is an extension of SSH? A. SFTP B. TFTP C. FTPS D. HTTPS

- A. SFTP - SFTP (Secure FTP), a file-transfer version of SSH that includes encryption and authentication and is sometimes inaccurately called FTP over SSH or SSH FTP. Note that SFTP is an extension of the SSH protocol, not the FTP.

Which current protocol is used to create secure transmissions for HTTP browsing sessions?

- All browsers today support SSL/TLS to create secure transmissions of HTTP sessions.

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

- OpenVPN, is an open-source VPN protocol that uses a custom security protocol called OpenSSL for encryption. OpenVPN has the ability to cross many firewalls where IPsec might be blocked.


Conjuntos de estudio relacionados

Economics Module 3: Applications of Supply and Demand

View Set

Chapter 18: Planning Nursing Care

View Set

Virginia DMV Practice Test, Learners Permit, Questions to Review, 2021

View Set

Chapter 27: Safety, Security, and Emergency Preparedness - PrepU

View Set

Anatomy and Physiology: The Human Body: An Orientation: Body Planes and Sections, Body Orientation and Direction

View Set

CSS145 Midterm - Case Studies in Customer Service

View Set

Credit Reporting Agencies and Financial Regulations

View Set